Search results for:
-
May 20th, 2014
Cyber Squared Inc. Announces Launch of ThreatConnect European Community
ThreatConnect Community Facilitates Public-Private Partnership for European Industries Cyber Squared Inc. announced today that ThreatConnect™, the leading threat intelligence platform, has launched
-
May 19th, 2014
Piercing the Cow’s Tongue: China Targeting South China Seas Nations
Executive Summary: The term “Cow’s Tongue” is a reference to the Chinese recognized nine-dashed line which demarks a highly contested region also known as the South China Sea (SCS). Between Jul
-
May 5th, 2014
ThreatConnect Enables “Healthy Networking” for the Biomed and Life Sciences Industry
Have you ever taken the time to consider how you and your colleagues view cyber security? Does your security team share common viewpoints, or are there unique philosophical differences? Do you all f
-
Apr 30th, 2014
Cyber Squared Inc. Announces Expansion of Data Services with Powerful Domain and Passive DNS Intelligence
ThreatConnect Users Leverage Power of DomainTools and Farsight Security in New Partnerships Cyber Squared Inc. announced today that ThreatConnect™, the leading threat intelligence platform, has ente
-
Apr 13th, 2014
Cyber Squared Inc. Announces Partnership with Malformity Labs
ThreatConnect Users Can Take Advantage of Paterva’s Maltego for a Clear Threat Picture of Their Environment Cyber Squared Inc. announced today that ThreatConnect™, the leading threat intellige
-
Apr 11th, 2014
Heartburn over Heartbleed: Assuming the Worst
Since the disclosure of the CVE-2014-0160 “Heartbleed” vulnerability, the industry has been abuzz with the traditional kneejerk responses that often plague most security teams, and justifiably so;
-
Mar 21st, 2014
Old Habits Die Hard: Iterative Intelligence & Comment Crew Activity
History is made when the notable details of past events are recorded and others can then learn from and study them. For example, you can go to any library and read about the Civil War. You can read ab
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e
-
Jan 7th, 2014
Cyber Squared Launches ThreatConnect™ API
API Allows Automated Access and Synchronization of Threat Intelligence Data Cyber Squared Inc. announced today that ThreatConnect™, the leading threat intelligence platform, has added the ThreatConn
-
Dec 18th, 2013
ThreatConnect Takes Signature Management to the Next Level
In modern enterprises, signature based threat detection capabilities are still considered a fundamental building block in most network defense strategies. To stay ahead of today’s sophisticated th
-
Dec 9th, 2013
The Dollars and “Sense” Behind Threat Intelligence Sharing
Intelligence Sharing: The Dollars and “Sense” Behind It Within the ThreatConnect Research Team, we feel that sharing what we know, whether publicly or privately, helps to grow our organiza
-
Nov 7th, 2013
Quickly Assess Maliciousness of Suspicious Activity with “Analyze”
Today’s IT security professionals are faced with mounting piles of log files, suspected malicious email attachments, and malware samples that could provide evidence of an attempted intrusion int